Question: 6. We consider the security services (A) confidentiality, (B) integrity, (C) authenticity, and (D) nonrepudiation, for a variety of simple protocols. The input is always

6. We consider the security services (A) confidentiality, (B) integrity, (C) authenticity,6. We consider the security services (A) confidentiality, (B) integrity, (C) authenticity, and (D) nonrepudiation, for a variety of simple protocols. The input is always the plaintext x. y is the packet sent from Alice to Bob. Describe which security services are achieved by the following protocols and how they work. (a) y = [h(x), x], where h(x) denotes a secure (collision resistant etc.) hash function. (b) y = [MAC(x), x], where MAC(x) denotes a secure message authentication code such as HMAC. (c) y = [encS (h(x)), x], where encS () denotes a secure stream cipher. (d) y = encB (x, h(x)), where encB () denotes a secure block cipher. (e) y = encS (x, sig(xm )), where xm is the last block of a long message x

6. We consider the security services (A) confidentiality, (B) integrity, (C) authenticity, and (D) nonrepudiation, for a variety of simple protocols. The input is always the plaintext x.y is the packet sent from Alice to Bob. Describe which security services are achieved by the following protocols and how they work. (a) y=[h(x),x], where h(x) denotes a secure (collision resistant etc.) hash function. (b) y=[MAC(x),x], where MAC(x) denotes a secure message authentication code such as HMAC. (c) y=[encS(h(x)),x], where encS () denotes a secure stream cipher. (d) y=encB(x,h(x)), where encB () denotes a secure block cipher. (e) y=encS(x,sig(xm)), where xm is the last block of a long message x

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!